Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41750: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Phoenix Contact FL SWITCH 2005

0
High
VulnerabilityCVE-2025-41750cvecve-2025-41750cwe-79
Published: Tue Dec 09 2025 (12/09/2025, 08:07:58 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: FL SWITCH 2005

Description

An XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.

AI-Powered Analysis

AILast updated: 12/16/2025, 10:30:38 UTC

Technical Analysis

CVE-2025-41750 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the Phoenix Contact FL SWITCH 2005 device’s web-based management interface, specifically the pxc_PortCfg.php component. The flaw arises from improper neutralization of input during web page generation, allowing an attacker to inject malicious scripts into the web interface. An unauthenticated remote attacker can exploit this by crafting a malicious URL that, when visited by an authenticated user, executes the injected script within the user's browser context. This script can manipulate configuration parameters exposed by the web management interface, potentially altering device settings without direct system-level access. The session cookie is protected by the httpOnly flag, which prevents attackers from stealing session tokens via script access, limiting the attacker's ability to hijack sessions. The vulnerability requires user interaction (clicking the malicious link) but no prior authentication, increasing the attack surface. The CVSS v3.1 base score is 7.1, reflecting high severity due to network attack vector, low attack complexity, no privileges required, but user interaction needed, and impacts on confidentiality, integrity, and availability within the scope of the web application. Although no public exploits are known, the vulnerability poses a significant risk to device configuration integrity and network reliability.

Potential Impact

For European organizations, especially those in industrial, manufacturing, energy, and critical infrastructure sectors that deploy Phoenix Contact FL SWITCH 2005 devices, this vulnerability presents a risk of unauthorized configuration changes. Such changes could disrupt network segmentation, degrade operational technology (OT) network performance, or open pathways for further attacks. The inability to access system-level resources limits the scope of direct system compromise, but manipulation of device parameters can indirectly impact availability and integrity of network operations. Confidentiality impact is limited to the web application context, but integrity and availability impacts are more pronounced due to potential misconfiguration. Given the reliance on these switches in industrial control systems (ICS) and critical infrastructure, exploitation could lead to operational disruptions or safety risks. The requirement for user interaction means phishing or social engineering campaigns targeting network administrators or operators are likely attack vectors. The lack of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation.

Mitigation Recommendations

1. Apply vendor patches or firmware updates as soon as they become available to address the XSS vulnerability directly. 2. If patches are not yet available, implement web application firewalls (WAFs) or intrusion prevention systems (IPS) with rules to detect and block malicious payloads targeting the pxc_PortCfg.php endpoint. 3. Restrict access to the web management interface to trusted networks and IP addresses using network segmentation and access control lists (ACLs). 4. Enforce multi-factor authentication (MFA) for accessing the web management interface to reduce the risk of unauthorized access even if a user is tricked into clicking a malicious link. 5. Conduct user awareness training focused on phishing and social engineering risks, emphasizing caution with unsolicited links related to network device management. 6. Monitor logs and network traffic for unusual configuration changes or access patterns to detect potential exploitation attempts. 7. Disable or limit web management interface access where possible, using alternative secure management methods such as out-of-band management or VPNs. 8. Regularly review and audit device configurations to detect unauthorized changes promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:18:45.759Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6937da92964788758a8a404b

Added to database: 12/9/2025, 8:15:14 AM

Last enriched: 12/16/2025, 10:30:38 AM

Last updated: 2/8/2026, 12:26:08 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats